This repository contains practical implementations and explanations of essential cryptographic techniques and cybersecurity attack simulations. It includes encryption algorithms, hashing methods, authentication mechanisms, and examples of common web and system vulnerabilities.
- ✔️ Monoalphabetic Ciphers (e.g., Affine Cipher)
- ✔️ Polyalphabetic Ciphers (e.g., One-Time Pad)
- ✔️ Transposition Cipher (Keyed Columnar)
- ✔️ Advanced Encryption Standard (AES)
- ✔️ RSA Algorithm
- ✔️ Diffie-Hellman Key Exchange
- ✔️ Digital Signature using Hashing
- ✔️ Secure Hash Algorithm (SHA)
- Clone the repository:
git clone https://github.com/mvharsh/Information-Security.git
- Navigate to the desired folder.
- Run the code using Python, Java, depending on the file type.
- Programming Languages: Python, Java, C, HTML
- Editors: VS Code / IntelliJ / Apache Netbeans / PyCharm